Authors

1 Department of computer sciences, University of Technology, Baghdad, Iraq

2 Computer science\Technology University\Iraq\Baghdad

Abstract

This paper will present a comparison between three proposed methods. All of these methods
include hiding a secret message inside a video for the aim of transferring it to another party with high
security and a high embedding rate in order to ensure that the secret message is not discovered by the
attacker. In addition , facilitating deals with video frames as large data for the purpose of analyzing,
dividing and controlling frames easily by the programmer, using the MapReduce method. This is
done by dividing the video into a series of frames, and before the hiding process, the message is
encrypted using the advance encryption standard (AES) algorithm. These basic processes are
implemented in all three proposed methods, the rest of the details for each method are:
The first method: used the pixel value difference (PVD) algorithm to hide the secret message in the
video. In addition, the stego secret key was also used. This key is used for the purpose of deciding the
locations of the pixels that will be employed to hide the secret message inside it.
The second method: the MapReduce principle is used for the purpose of facilitating dealing with
video frames. The chosen frame will enter the MapReduce stages. This is implemented by dividing the
frame into three matrices red, green, blue (RGB). Each matrix represents a map. Moreover, the
technique that is used for concealment is the least significant bit (LSB) technology which uses the
stego secret key (x2) for the purpose of selecting sites that will be hidden by it.
The third method: Also, the MapReduce principle is used, but this method is implemented by dividing
the frame into four blocks. Each block represents a map. In one of the stages of the MapReduce, the
hiding process will be done by using the (PVD) method which uses the stego secret key (n+15).
Finally, the reducer, which is the last stage, will collect the results of each block to generate the
stego-frame.
The results of the three methods are efficiency, transparency, robustness and powerful in stego
video. It is noticed that the second method has achieved the lowest capacity, thus achieving high
security. As for the third method, it achieved the highest capacity and the highest execution time was
the first method. Despite this, all the three methods have achieved high security. The attacker or
unauthorized person cannot detect any suspicious differences in a stego video. These results are
obtained through using many measurements: peak signal-to-noise ratio (PSNR), Mean Squared Error
(MSE), Entropy and correlation coefficient.

Keywords